Online & Classroom
Advance Ethical Hacking
Advance Modules | CEH V 11 Taining Academy Certification | 8999/- Course Fees
Fill up the brochure form to download the course brochure after the form submition you will recive brochure on your email .
Virtual Lab Setup
We set up Advance lab for penetretation testing and Ethical Hacking
50 + Advance Tools
Learn on Damn Vulnerable web application To attempt Un number of Attack like SQl Injection , Cross side Scripting
Free Networking Classes
60+ Hours of Practical Assignments
Hands-on Experience in a Live Project
Lifetime LMS Access
Hands-on Experience in a Live Project
Indepth Advance Modules
The Most Detailed Ethical Hacking syllabus compare it Youself
Intro to Ethical Hacking
- what is Hacking ?
- what is Ethical Hacking ?
- Concept of Ethical Hacker & Hacker.
- Why Ethical Hacking is necessery
- Type of hackers White , black , gray .
- Ethical hacking , penetration testing and bug hunting.
- What is cyber security ?
- Certifications in cyber security .
- Cyber security as a career options
- Difference between ethical hacker and penetration tester.
- Introduction of Linux operating system
What is Github?
How to download Github tool?
How to install Github tool
Github tool dependency troubleshoot
Footprinting & Reconnaissance
Websites and Urls Terminology
Footprinting through Search Engines
Footprinting through Social Networking Sites
Footprinting through Social Engineering
Active Informaton Gathering
+ Directory fuzzing
Passive Information Gathering
– Whois lookup
Tools of Information Gathering
Introduction of Google Hacking Database (GHDB).
Exploits and payloads in GHDB.
– Sql injection google dork
– Advance google search
What is CVE ?
Vulnerability Scanning using Nmap.
Vulnerability Scanning using Nikto .
Setup and scanning with Nessus
Wpscan for wordpress websites
Tools for Android
Introduction of Social Engineering
Types of Social Engineering
– Shoulder Surfing
– Dumpster diving
website cloning using HTtrack
Introduction to Phishing
Password Phishing using link
Study of Social Engineering tools in kali linux
15. Denial-of-Service (DoS)
Introduction of DoS & DDoS Attack
Types of DoS – SYN flooding , ping-of-death (POD)
DoS Attack on website
DoS Attack on Router
DoS Attack using Hping3
SYN flooding Attack using Metasploit
Evading IDS,Firewall & Honeypots
What is firewall?
What is a honeypot used for?
What is IDS/IPS ?
Download honeypot on Ubuntu and use
How to use snort
What is evading IDS
Information security Terms
- Introduction Information Security
- What is security ?
- Need of security ?
- Security Basics (CIA)
- Risk & Threat Analysis
(Risk = Assets * Threat * Vulnerabilities)
- Concept of Viruses & Worms
- What is difference between spyware , worm , malware
- Intruders & Insiders
- Types of Attacks (Active & Passive)
- Backdoors & Trapdoors
- Types of hacking attacks
1)Denial of service and distributed denial of service attac Password attack
– Phishing and spear phishing attack
– Man in the middle attack (Bucket-Bridge-Attack)
– Malware attack
– Website attack
– Social engineering attack
– Zero-day attack
– Ransomware attack
- What are the different types of malware?
– Bots & botnets
– Adware & scams
– Trojan horses
How to protect from viruses?
Proxy chains & VPN
Concept of Proxychains.
Types of Proxychains.
What is VPN ?
Setup of VPN .
Mac Addressing concept
Mac Changing .
Introduction of TOR browser
Introduction of Deep web , Dark Web
proxy tools for pc – proxy switcher , proxy workbench, Tor
Proxy tools for Android – Orbot ,open door
Introduction of Network .
Network Connecting Devices – Router , switch,Hub,Gateways,Bridge.
Concept of PAN,LAN,MAN,WAN,CAN
peer-to-pear & client server connection
Network Topology – Bus,Ring,Mesh,Star,Tree,Hybrid
Introduction of IP Addressing and it’s classes .
IPv4 & IPv6 Addressing and it’s limitations
Subnetmask in ipv4
Introduction of Routers & it’s protocol – DHCP
Addressing static IP to computer.
– Ngrok use for port forwarding
– Openvpn server installation
What is the purpose of the OSI model?
Introduction to Hash & Hash Algorithems
Online and offline password attack
+ Online password attack
+ Offline password attack
– John the ripper
Wordlist Genrator for password cracking.
concept of keyloggers and it’s types
- Type of website
12.3 Type of website database
12.4 Type of website attack
– SQL Injection
– Cross-site scripting
– LFI/RFI attack
– Admin bypass
– File uploading attack
– File tampering
Introduction of SQL Injection
Types of SQL Injection
Error base SQL Injection
SQL Injection using Hackbar
SQL Injection using SqlMap tool
SQL Injection on Login Page
SQL Injection using manual method
SQL injection tools – sqlmap
Introduction of Cryptography
What is encryption
Type of encryption
What is Plaintext ?
What is ciphertext ?
Encryption & Decryption .
various hashes – MD5 , RSA , SHA
Tools for Image Stegnography – stegosuit
Lab Setup - Kali Linux
Introduction to Kali Linux and other operating systems.
Why Hackers use Linux ?
What is the different between windows and linux OS?
Create Bootable Pendrive
Setup kali linux on VMware
Setup Kali linux – Dual Boot
Introduction GUI of kali linux
Introduction of tools of kali linux
Introduction of Parrot Os
Introduction of Red Hat
Introduction of Arch & Black Arch linux
Basic commands of kali linux
Advance commands of kali linux
Networking commands of kali linux
partation in linux operating system
Bash scripting basics
Type of services use and basic installation
– http service use and installation
– ftp service use and installation
– nfs service use and installation
– ssh service use and installation
Reverse shell and bind shell
Netcat and pwncat
Powershell and socat
Techniques for Enumeration
Services and Ports to Enumerate
DNS Zone Transfer Enumeration Using NSLookup
Introduction of Zenmap
Enumeration using Softperfect Network Scanner tool
Sniffing & Spoofing
Introduction to sniffing
What is password sniffing?
What is active and passive sniffing?
Man in the middle attack
– What is session hijacking attack?
– Does SSl prevent session hijacking?
– Cookies poisoning / stealing
Wireshark tool for sniffing
Sniffing with aircrack-ng
Introduction to spoofing
E-mail spoofing technique
– Email spoofing php tool
– Email spoofing online tool
concept of Ip spoofing
concept of MAC spoofing
concept of DNS spoofing
Hacking Wireless Networks
What is a wireless attack?
What does WiFi actually do?
What is Wifi Deauthentication/Jamming attack
Type of WiFi attack tool
– Hash crack using crunch
– Hash crack using hashcat
Wifi hacking using Fluxion Github tool
18. Hacking Mobile & Computer Platforms
Overview of Android os and Computer os
Introduction to Metasploit Framework
What is Android hacking and android penetration testing ?
Android hacking on LAN / WAN
What is Metasploit?
Cli and GUI of Metasploit
Different tools to make android payload
Windows password hacking/recovery
Linux password hacking/recovery
System hacking on lan /wan
System hacking using Metasploit
– Shell to meterpreter
– Privileged escalation
– Browser history dump
How to get VNC / RDP access
How to persistence